International Politics Essays (Examples)

Studyspark

Study Document Study Document

Gun Control Act Of 1968

Pages: 7 (2011 words) Sources: 8 Document Type:Research Paper Document #:16217740

… the assassination of both Martin Luther King and President J.F. Kennedy, there was a clear need for an interventionist measure in the gun politics realm. Today, gun control remains a rather divisive issue in our nation’s politics. Thanks to an escalation in mass shooting incidences, it may be time to re-assess the effectiveness of our gun-control laws. Stricter gun control ……

References

References

Ausman, J.I. & Faria, M.A. (2019). Is Gun Control Really About People Control? Surgical Neurology International, 10(6), 195-204.

Bouton, L., Conconi, P., Pino, F. & Zanardi, M. (2014). Guns and Votes. Retrieved from  https://www.nber.org/papers/w20253 

Cole, G.F., Smith, C.E. & DeJong, C. (2016). Criminal Justice in America (9th ed.). Boston, MA: Cengage Learning.

Gramlich, J. & Schaeffer, K. (2019). 7 facts about guns in the U.S. Retrieved from  https://www.pewresearch.org/fact-tank/2019/10/22/facts-about-guns-in-united-states/ 

Hayes, V. (2016). Gun Control in the United States. Journal of Political Sciences & Public Affairs, 4(2), 33-39.

Johnson, N.J., Kopel, D.B. & Mocsary, G.A. (2017). Firearms Law and the Second Amendment: Regulation, Rights, and Policy. New York, NY: Wolters Kluwer Law & Business.

Joslyn, M., Haider-Markel, D., Baggs, M. & Bilbo, A. (2017). Emerging Political Identities? Gun Ownership and Voting in Presidential Elections. Social Science Quarterly, 98(2), 382-396.

Webster, D.W. & Wintemute, G.J. (2015). Effects of Policies Designed to Keep Firearms from High-Risk Individuals. Annual Review of Public Health, 36, 21-37.

Studyspark

Study Document Study Document

Immigration Reform

Pages: 5 (1424 words) Sources: 6 Document Type:Essay Document #:73100593

… of the War for Independence onward it was a White Anglo-Saxon Protestant (WASPs) ethic that served as the fulcrum for American power and politics. It was this fulcrum that established the concept of “Manifest Destiny”—i.e., the idea that it was America’s (that is, the WASP’s) destiny in ……

References

Works Cited

Bartoletti, Susan C. 2001. Black Potatoes: The Story of the Great Irish Famine, 1845-1850. New York, NY: Houghton Mifflin.

Calavita, Kitty. Inside the State: The Bracero Program, Immigration, and the I. N. S. New York, NY: Routledge, 1992.

Federation for American Immigration Reform. “The costs of illegal immigration on United States taxpayers—2013 edition.” FAIR.  https://fairus.org/issue/publications-resources/fiscal-burden-illegal-Immigration-2013 

Hafetz, J. “Immigration and national security law: Converging approaches to state power, individual rights, and judicial review.” ILSA Journal of International and Comparative Law 18.3. (2012): 628.

O’Sullivan, J. L. “Manifest Destiny,” in Voices of Freedom: A Documentary History, 4th edition, ed. Eric Foner. New York: W.W. Norton, 2014.

McCaffrey, Lawrence John. The Irish Catholic Diaspora in America. CUA Press, 1997.

Studyspark

Study Document Study Document

Counterintelligence Issues Within United States

Pages: 13 (3766 words) Sources: 16 Document Type:Essay Document #:41694312

… against espionage, other intelligence activities, sabotage, or assassinations conducted for or on behalf of foreign powers, organizations, or persons or their agents, or international terrorist organizations” (National Counterintelligence and Security Center Strategy 2018-2020 2020, 2). The conflated, mixed, broad, and somewhat vague strategic objectives that have been ……

References

Bibliography

2020-2022 National Counterintelligence Strategy of the United States. 2020. Washington, DC: National Counterintelligence and Security Center

Bailey, Christopher and Susan M. Galich. 2012. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35 (2): 77-99.

Bernardi, Beatrice. 2013. \\\\\\"The Role of Intelligence in the Fight Against International Terrorism: Legal Profiles.\\\\\\" Bachelor\\\\\\'s thesis, Università Ca\\\\\\'Foscari Venezia.

Carson, Thomas L. 2010. Lying and Deception: Theory and Practice. Oxford University Press.

Erskine, Toni. 2004. \\\\\\"\\\\\\'As Rays of Light to the Human Soul\\\\\\'? Moral Agents and Intelligence Gathering.\\\\\\" Intelligence & National Security 19 (2): 359-381.

Godson, Roy, and James J. Wirtz. 2000. \\\\\\"Strategic denial and deception.\\\\\\" International Journal of Intelligence and Counterintelligence 13 (4): 424-437.

Horkheimer, Max. 1972. Critical Theory. New York: Seabury Press.

Intelligence and National Security Alliance. 2020. Counterintelligence for the 21st Century. Arlington, VA.

Studyspark

Study Document Study Document

The Modern World Of Autonomy Vs Heteronomy

Pages: 5 (1560 words) Sources: 8 Document Type:Essay Document #:86232532

...International politics Introduction
In the world today, information societies, all referred to as digital or postindustrial societies, are among the latest developments and are mainly founded on the generation of services and information. Information societies are powered by digital technology, and high-tech organizations like Microsoft, RIM, and Apple are its version of steel and railroad production companies. Given that the information societies’ economy is steered by knowledge, great power lies among those in control of the production, storage, and distribution of information (Steiner and Stewart, 527). Social classes are subdivided by peoples’ access to an education, because without any communication and technical skills, individuals part of an information society do not have any means to succeed.
Theoretical perspectives on modern society
Whereas several sociologists have conducted various research on social and society interactions, Max Weber and Karl Max established different theoretical strategies to assist us in understanding the development and growth of……

References

Works cited

Gerth, H. H., and C. Wright Mills. \\\\\\\\\\\\"Politics as a Vocation.\\\\\\\\\\\\" From Max Weber: Essays in Sociology (1946): 77-128.

Little, William. “Chapter 4. Society and Modern Life.” Introduction to Sociology – 2nd Canadian Edition. (n.d.). Web.

Lumen Learning. “Theoretical Perspectives on Society.” Society and Social Interaction. (n.d.). Web.

Marx, Karl, and Friedrich Engels. \\\\\\\\\\\\"The Communist Manifesto.\\\\\\\\\\\\" Selected Works bu Karl Marx and Frederick Engels. Neu York: International Publishers 1363 (1848). 108-127.

Marx, Karl. \\\\\\\\\\\\"Economic and philosophical manuscripts.\\\\\\\\\\\\" Early writings 333 (1844) 75–112.

Marx, Karl. Grundrisse: Foundations of the critique of political economy. Penguin UK, 2005. 82-111.

Steiner, Pierre, and John Stewart. \\\\\\\\\\\\"From autonomy to heteronomy (and back): The enaction of social life.\\\\\\\\\\\\" Phenomenology and the Cognitive Sciences 8.4 (2009): 527.

Weber, Max. The protestant ethic and the spirit of capitalism. New Introduction and Translation by Stephen Kalberg. ROXBURY PUBLISHING COMPANY, 2001. 13-37

Studyspark

Study Document Study Document

The Ethics Of Clandestine Operations

Pages: 11 (3151 words) Sources: 14 Document Type:literature review Document #:69864024

… lieu of warfare to satisfy state ambitions. Statecraft today is replete with instances of clandestine operations that range from operations designed to influence politics in other countries and domestically to political assassinations. However, with so many different agencies, organizations and groups flying under the radar like OSP ……

References

Bibliography

Arnold, A. and D. Salisbury. The Long Arm, 2019. Retrieved from https://www.belfercenter.org/publication/long-arm

Barker, Michael J. \\\\\\"Democracy or polyarchy? US-funded media developments in Afghanistan and Iraq post 9/11.\\\\\\" Media, Culture & Society 30, no. 1 (2008): 109-130.

Best, Richard A. Intelligence to Counter Terrorism: Issues for Congress. Congressional Research Service: CRS Report for Congress, 2002.

Carter, Ashton B. \\\\\\"Overhauling counterproliferation.\\\\\\" Technology in Society 26, no. 2-3

(2004): 257-269.

Crumpton, Henry A. The art of intelligence: lessons from a life in the CIA\\\\\\'s clandestine service. Penguin, 2013.

Hersh, Seymour. Selective Intelligence. The New Yorker, 2003.  http://www.newyorker.com/magazine/2003/05/12/selective-intelligence 

McCormick, G. H., & Owen, G. “Security and coordination in a clandestine organization.” Mathematical and Computer Modelling, 31, no. 6-7 (2000), 175-192.

Studyspark

Study Document Study Document

Weapons Of Mass Destruction WMD Antifa

Pages: 13 (3787 words) Sources: 12 Document Type:Research Paper Document #:67320498

… maintaining energy infrastructure, what is the likelihood that cyber warfare could be used to attack America’s energy infrastructure in the event that an international conflict breaks out in the coming years? What can the U.S. do to protect its network given that cyber attackers are always developing ……

References

References

Chatfield, A. T., Reddick, C. G., & Brajawidagda, U. (2015, May). Tweeting propaganda, radicalization and recruitment: Islamic state supporters multi-sided twitter networks. In Proceedings of the 16th Annual International Conference on Digital Government Research (pp. 239-249).

Christenson, G. (2015). CBRN response. National Guard Bureau.

Freberg, K., Graham, K., McGaughey, K., & Freberg, L. A. (2011). Who are the social media influencers? A study of public perceptions of personality. Public Relations Review, 37(1), 90-92.

Garellek, A. (2016, March 4). The ISIS WMD Threat. The Cipher Brief. Retrieved from  https://www.thecipherbrief.com/article/middle-east/isis-wmd-threat 

Jennings, P. (2006). Miami port poses serious risks. Retrieved from  https://abcnews.go.com/WNT/story?id=131634&page=1 

Johnston, W.R. (2016, November 30). Summary of historical attacks using chemical or biological weapons. The Johnston Archive. Retrieved from  http://www.johnstonsarchive.net/terrorism/chembioattacks.html 

Klein, A. (2019). From Twitter to Charlottesville: Analyzing the Fighting Words Between the Alt-Right and Antifa. International Journal of Communication, 13, 22.

Maras, M-H. (2014). Transnational Security. Florida: CRC Press.

Studyspark

Study Document Study Document

Angleton S Counterintelligence Program And What Went Wrong

Pages: 9 (2657 words) Sources: 8 Document Type:Essay Document #:36485484

...International politics Counterintelligence Thesis Proposal
Abstract
This proposal describes the need for an ethical standard in counterintelligence. It discusses how an analysis of the formation of the counterintelligence program under Angleton can provide insight into what went wrong with counterintelligence and how those problems can be prevented in the future. It uses a combination of conflict theory, structural functionalism and critical theory to explore the dimensions of counterintelligence in the 1950s, 1960s, and 1970s. The research design is qualitative with the case study approach to Angleton’s counterintelligence serving as the method. The aim of the research is to provide an ethical framework that could be used to help the counterintelligence enterprise collaborate more effectively with the private sector in the future.
Introduction
Intelligence and counterintelligence operations have always been a part of the American Republic (Federation of American Scientists 1996). General Washington was aware of the threat of foreign espionage and the……

References

Reference List

Bailey, Christopher and Susan M. Galich. “Codes of Ethics: The Intelligence Community.” International Journal of Intelligence Ethics 35.2 (2012), 77-99.

Bartos, C. and P. Wehr. 2002. Using conflict theory. UK: University of Cambridge.

Bellaby, Ross. "What's the Harm? The Ethics of Intelligence Collection." Intelligence and National Security 27, no. 1 (2012): 93-117.

Church Committee. “Final report of the Select committee to study governmental operations With respect to Intelligence activities United states senate Together with Additional, supplemental, and separate Views.” Intelligence.senate.gov, 1976. https://www.intelligence.senate.gov/sites/default/files/94755_I.pdf

Coyne, John, Peter Bell, and Shannon Merrington. "Exploring ethics in intelligence and the role of leadership." Interntional Journal of Business and Commerce 2, no. 10 (2013): 27-37.

Erskine, Toni. "'As Rays of Light to the Human Soul'? Moral Agents and Intelligence Gathering." Intelligence & National Security 19, no. 2 (2004): 359-381.

Nakashima, Ellen. “Top counterintelligence official challenges the private sector to step up defenses against foreign spying.” Washington Post, 2020.  https://www.washingtonpost.com/national-security/top-counterintelligence-official-challenges-the-private-sector-to-step-up-defenses-against-foreign-spying/2020/02/10/d842d83c-4c15-11ea-9b5c-eac5b16dafaa_story.html 

Studyspark

Study Document Study Document

Struggle To Achieve Political Objectives In United States

Pages: 3 (1041 words) Sources: 4 Document Type:Essay Document #:90705510

… to eight years and this means a new approach to policy is brought in each time, which makes it difficult for a consistent international policy to take hold. Second, if “strategy is a concept for relating means to ends,”[footnoteRef:2] the means (military power) may stay the same … There is the State Department, the military, the intelligence community, the White House, Congress, and business interests—and all have…[break]…/>
In conclusion, to achieve international political objectives, it requires stability, consistency of vision, coherent and consistent strategy, and support from allies around the world. In recent years, the ……

References

Bibliography

Builder, Carl H. “The Masks of War: American Military Styles in Strategy and Analysis.”

Gray, Colin S. “Why Strategy is Difficult,” JFQ.

Habeck, Mary. “Why They Did It,” Knowing the Enemy: Jihadist Ideology and the War on Terror.”

Walt, Stephen. “Why Alliances Endure or Collapse,” Survival, vol. 39, no. 1 (Spring 1997), 156-179.

Studyspark

Study Document Study Document

What Is Public Administration Today

Pages: 8 (2502 words) Sources: 8 Document Type:response paper Document #:69284084

...International politics Public Administration
How Public Administrative Discretion Works
1
The main difference between public and private administration is that in the former the administration both administers to the public and is accountable to the public; in the latter, the administration is accountable only to stakeholders, which may or may not include members of the community/public. Other differences include the fact that in private administration, the idea is that the administration is overseeing some business organization that focuses on a goal related to its mission, its business model. Public administration, on the other hand, refers to a political process wherein official administrators are elected or appointed to do a job for the good of the public. They typically control or use public funds; must give a public accounting of how funds are used, and must to all intents and purposes fulfill a mandate given them by the public—though, of course, it is……

References

References

Cann, S. (2007). The Administrative State, the Exercise of Discretion, and the Constitution. Public Administration Review, 67(4), 780–782.

EPA. (2015). Administrative discretion. Retrieved from  https://www.epa.gov/sites/production/files/2015-11/documents/administrative_discretion_nonotesclean.pdf 

Reyes, P., & Pounder, D. G. (1993). Organizational orientation in public and private elementary schools. The Journal of Educational Research, 87(2), 86-93.

Reyes, D. R. (1998). Public sector reengineering: Practice, problems and prospects.

Rinaldi, M., Montanari, R., & Bottani, E. (2015). Improving the efficiency of public

administrations through business process reengineering and simulation: A case study. Business Process Management Journal, 21(2), 419-462.

Rubenstein, D. S. (2015). Administrative Federalism as Separation of Powers. Wash. & Lee L. Rev., 72, 171.

Savoie, D. J. (2006). What is wrong with the new public management?. In Comparative Public Administration (pp. 593-602). Emerald Group Publishing Limited.

Studyspark

Study Document Study Document

Trends In Civil And Criminal Liability In The Private Security Industry

Pages: 2 (698 words) Sources: 4 Document Type:Essay Document #:47555416

...International politics The private security industry will become generalists in the next century. The industry must be well versed in a number of disciplines. It must base its operations and decisions on demographic and economic trends, and rapid technological changes. Traditionally, the private security industry focused mainly on security and safety of its subjects. Although they continue to be a major focus of the industry, prevailing trends indicate that the industry requires extensive knowledge in other emerging critical areas to become successful. The additional areas include, but are not limited to law, computers and management (Dempsey, 2008).
Current and future private security companies require extensive knowledge of the law. Legislations governing the industry have either been passed by various states or in the processed of being passed. Furthermore, several federal laws indirectly or directly affect management of the private security industry. For instance, legislation on denying employers polygraph use in pre-employment screening……

References

Works Cited

Dempsey, John S. Introduction to Private Security. Belmont, CA: Thomson Wadsworth, 2008. Print.

Encyclopedia of Security Management: Techniques & Technology. Place of publication not identified: Elsevier Science, Inc, 1993. Print.

Nemeth, C.P. (2018), Private Security: An Introduction to Principles and Practices, CRC Press

Nemeth, Charles. Private Security and the Law. , 2011. Internet resource.

Join thousands of other students and

"spark your studies".